mslp - Mesh-enhanced Service Location Protocol Λ

Size: px
Start display at page:

Download "mslp - Mesh-enhanced Service Location Protocol Λ"

Transcription

1 mslp - Mesh-enhanced Service Location Protocol Λ Weibin Zhao and Henning Schulzrinne Department of Computer Science Columbia University, New York, NY fzwb, hgsg@cs.columbia.edu Abstract The Service Location Protocol (SLP) is a proposed standard from IETF. It provides a flexible and scalable service discovery framework in IP network, and it can work with or without a directory service. This paper presents mslp - Mesh-enhanced Service Location Protocol. mslp proposes to use a fully meshed peering Directory Agent () architecture. Peer s exchange service registration information, and keep the same consistent data for the shared scopes. mslp provides a reliable directory service for an SLP system. It also greatly simplifies SLP service registration leading to a thin-client Service Agent () implementation. mslp is backward compatible with SLPv2, and incremental deployment is supported. Keywords: Service Discovery, Service Location Protocol, User Agent, Service Agent, Directory Agent, Fully Meshed Peer Relationship, Reliability, Scalability 1 Introduction As computing continues to move towards a network-centric model, there is an increasing need to find and make use of the available services, devices, and applications in a variety of networking environments in order to properly complete specified tasks. For example, the mobile technology provides much convenience for a traveling user, it relies upon the support from automated service discovery. As a result, several service discovery protocols are emerging from network computing field to address this issue. The Service Location Protocol (SLP) [4] from IETF is designed to perform service discovery in IP network. Jini [7] from Sun Microsystems is tailored specifically to Java platform. The Universal Plug and Play (UPnP) [9] from Microsoft proposes to use SSDP (Simple Service Discovery Protocol) [2] for service discovery, and it addresses the issue of automatic configuration such as the assignment of IP addresses and DNS names. The Salutation Consortium [8] has announced an open architecture for service discovery. The Bluetooth SIG [5] presents its own SDP (Service Λ Supported by RPA MarketNet project. 1 Discovery Protocol) optimized for the highly dynamic nature of wireless communication using radio link. The Infrared Data Association (Ir) [6] also offers its unique service discovery protocol. Although different service discovery protocols have different features, they use two basic models. In the directorycentric model, there is a centralized directory service which maintains dynamic information about available network services, devices and applications. Each device, service and application must discover this directory service first in order to register with it or use it to look up the information about other devices, services and applications. In the peer-to-peer model, no centralized directory service is needed. Devices, services and applications negotiate oneon-one with each other, announcing their presence, advertising their own capabilities, and finding devices, services or applications that meet their needs. This model fits perfectly in an ad hoc peer-to-peer networking environment. Jini adopts the directory-centric model with a lookup service while Ir uses the peer-to-peer model. SLP and UPnP support both models. No matter what model is used, the underlying principles for service discovery are same. First, an entity (device, service or application) needs to announce its presence to others. This can be done by registering with a directory service, by regularly advertising through a special channel or address, or by listening to a special channel or address and issuing a reply when there is a request. Second, the service discovery is performed by looking up a directory service, by sending a discovery request to a special channel or address, or by listening to a special channel or address for others announcements. Most service discovery protocols utilize multicast (or broadcast) which is needed at least in the initial discovery stage such as discovering a lookup service. In some cases, information is needed if none of above mechanisms exists. Among the current available service discovery protocols, SLP is a proposed standard from IETF. It has received wide industry support. For example, Sun Microsystems has built SLP into its Solaris 2.8 operating system; Novell supports SLP in its NetWare product. SLP can work with or without a directory service. The directory service is introduced for performance and scalability considerations, and it is provided by Directory Agents (s). However, SLP does not

2 define how s should coordinate with each other when multiple s exist. This paper presents mslp - Mesh-enhanced Service Location Protocol, which enhances SLP with an interaction scheme for s. It proposes that if s are needed in an SLP system, a fully meshed peering architecture should be used, i.e., more than one should be present for each scope, and they should maintain a fully meshed peer relationship. Peer s exchange service registration information, and keep the same consistent data for the shared scopes. mslp provides a reliable directory service for an SLP system. It also greatly simplifies SLP service registration leading to a thin-client Service Agent () implementation. Thus, the scalability of an SLP system can also be enhanced. Moreover, mslp is entirely backward compatible with the SLP specification defined in RFC 2608, and incremental deployment is supported. The rest of this paper is organized as follows: first, we provide some background information about SLP in Section 2, then we describe the design of mslp in Section 3, covering design considerations, peer relationship management and message forwarding control. We show an mslp system example in Section 4, and discuss the implementation in Section 5. We list related work in Section 6, and conclude in Section 7. 2 SLP Overview Defined in Request for Comments (RFC) 2608, SLP provides a flexible and scalable framework for service discovery in IP network. Using SLP, a networked service (device, or application) can easily find all available service types, the locations (URLs) where a specific service is provided, and service descriptions. To understand how SLP works, we first review several important concepts SLP used to describe and manage networked services. Service Location Service locations in SLP are given by URLs, which can be any URL conforming to URI standard [1] such as or can be of the service: scheme defined in [3] such as service:lpr://mandolin.cs.columbia.edu. Service Type Each service in SLP has a service type. For example, the service type of is http (web service); the service type of service:lpr://mandolin.cs.columbia.edu is service:lpr (printing service). All services in SLP are categorized by their service types. Service Description Besides service location and service type, each service in SLP has many other properties which can be described by a set of attribute/value pairs. These properties include service capability and configuration parameters. For example, we may specify resolution = 1200 dpi for a printer service. Application SrvTypeRqst/SrvRqst/AttrRqst SrvTypeRply/SrvRply/AttrRply SrvTypeRqst/SrvRqst/AttrRqst SrvReg/SrvDeReg SrvTypeRply/SrvRply/AttrRply SrvAck Figure 1: SLP System Architecture Service Service Scope Each service in SLP has one or more service scopes which specify its service range. The service scope is a logical concept in SLP used to arrange services into groups. A scope could indicate a geographic location (such as London ), a administrative group (such as Law School ), or other category (such as Emergency ). Service scope provides further scalability for SLP in large systems. Service Lifetime Each service registration has a validity period given by its service lifetime (such as 12 hours). A registration needs to be refreshed before its lifetime has expired, otherwise the registration will be removed from the directory service. There are three different entities in an SLP system: User Agents (s), Service Agents (s), and Directory Agents (s). Figure 1 illustrates their relationship. User Agents (s) A initiates service discovery on behalf of one or more applications. It sends queries to all s via multicast or to a via unicast if there is such supporting the query scope. A uses three different types of SLP messages to discover the desired services. First, it issues a service type request (SrvTypeRqst) message to get a list of all available service types in a service type reply (SrvTypeRply) message. Second, it issues an attribute request (AttrRqst) message to get a list of all attributes for a given service type in an attribute reply (AttrRply) message. Third, it issues a service request (SrvRqst) message with an attribute predicate specifying the characteristics of the desired service to get a list of URLs giving the locations of matched services in a service reply (SrvRply) message. Starting from the desired service type, and a set of attributes describing the service, SLP resolves the service addresses (URLs) for the user. Service Agents (s) An works on behalf of one or more services. It responds directly to queries. If s exist, it registers the services with s using service registration (SrvReg) messages. SLP supports incremental service registration in which an can 2

3 Multicast SrvRqst (1) / Unicast Advert (2) / Multicast Advert Unicast SrvRqst Unicast SrvReg Unicast SrvAck Unicast SrvAck Unicast SrvReg Figure 2: Discovery: (1) Active (2) Passive Figure 4: Medium SLP System with s Multicast SrvRqst Multicast SrvRqst Multicast SrvRqst CU Scope NYU Scope Figure 3: Small SLP System without s update attribute values or add new attributes to a previously registered service. The new attributes replace the old values, but do not affect the attributes which were included previously and are not present in the update. Thus, a SrvReg message can be a fresh service registration or an update to a previous registration. An can also deregister the services with s using service deregistration (SrvDeReg) messages before the registered services become expired. Directory Agents (s) A serves as a centralized information repository in an SLP system. It accepts registrations and answers queries. support is optional in an SLP system; it is introduced for performance and scalability considerations. s can be discovered (Figure 2) in two ways: active or passive. In SLP, each periodically sends unsolicited advertisement (Advert) messages to the administratively scoped SLP multicast [10] address ( ). All s, s and s listen to this address to discover the existing s. This is known as passive discovery. s and s can also perform active discovery by issuing a multicast discovery service request message (SrvRqst with a service type of service:directoryagent ) to above address. s answer each discovery request with a unicast advertisement message. Whether s exist or not, an SLP system can provide the same service discovery functionality. However, it works a little bit differently. ffl In a small SLP system without s (Figure 3), s directly send service request (SrvRqst) messages to Figure 5: Large SLP System with Multiple Scoped s all s via multicast, and s respond with unicast service reply (SrvRply) messages. ffl Since it is not very efficient for a to query all s via multicast every time it does service discovery, in a medium-sized SLP system (Figure 4), s are introduced to provide a centralized directory service. s register services with s, and s look up service information from s. All service registrations from s and service queries from s are sent to s via unicast. ffl In a large SLP system (Figure 5), s are arranged into different scopes. For example, services from Columbia University and NYU are assigned to different scopes served by different s. This ensures further scalability of SLP. We can see that SLP achieves scalability by using s and service scopes. However, the centralized directory service provided by s presents a single failure point in an SLP system. To ensure reliability, multiple s are needed for each service scope. When multiple s are present, how should they interact with each other? This is an open issue in SLPv2 (SLP version 2). 3 DesignofmSLP mslp enhances SLP with an interaction scheme for s to provide a reliable directory service. It proposes that if s are needed in an SLP system, a fully meshed peering architecture should be used, i.e., more than one 3

4 1 Multicast Advert [ attr = mesh enhanced ] 2// Figure 6: Mesh-enhanced Advertisement should be present for each scope, and they maintain a fully meshed peer relationship. Peer s exchange their data for the shared scopes when they set up a peer relationship, and continue to exchange new service registration information during the entire peering period. As a result, peer s maintain the same consistent data for the shared scopes. Our design uses the following terminology: Peer s If two s have one or more scopes in common within one administrative domain, they are peers. Peer s coordinate with each other and store the same consistent data for the shared scopes. Peering TCP Connection - a persistent TCP connection kept by a pair of peer s for the entire peering period. It provides a reliable communication channel for the peer s to exchange messages. Therefore, a implementation is not burdened by managing message retransmissions. Its closing can be an indication of the termination of the peer relationship. Mesh-enhanced - a who maintains a fully meshed peering architecture with other s in an mslp system. It carries the mesh-enhanced attribute in its Advert messages (Figure 6) to distinguish itself from non-mesh-enhanced s. Mesh-aware - an who understands the meshenhanced attribute in a Advert message and uses the mesh-enhanced capability accordingly. In the next three subsections, we first describe our design considerations for mslp, then we discuss two important issues: how to manage the peer relationship and how to control message forwarding among peer s. 3.1 Design Considerations Reliability: The fully meshed peering architecture provides a reliable directory service for an SLP system. It achieves maximum robustness by ensuring that no single failure point exists in the system. All service registrations are kept by at least two s. If one is down, at least one other peer can continue to provide the service information for the scope. More importantly, the peering architecture enables a to recover from crash with much less effort since a rebooted can get the existing data from its peering set. The fully meshed peering architecture is built on top of a set of fully meshed peering TCP connections. We choose to use this set of fully meshed peering TCP connections mainly because it greatly facilitates message forwarding control. Any service registration information received by a only needs one-hop forwarding to reach all other s in the peering set. Since adding too many s to a peering set does not help a lot with the reliability, and it increases the maintenance overhead, we anticipate a small number of s for each service scope, and 2-4 is the recommended value. There is no need to have separate for each scope. A can serve multiple scopes, and a peering TCP connection is used for all shared scopes between each pair of peer s. Scalability: The SLPv2 specification requires that s register with all existing s and re-register when new s are discovered, or old s are found to have rebooted. This places a substantial burden on an implementation. With mslp, this requirement on s can be greatly simplified, i.e., a mesh-aware only needs to register with one mesh-enhanced in the registration scope, and the registration information will be propagated automatically within the meshed set. With mesh-enhanced s and simplified s, the overall system scalability can be enhanced. Compatibility: mslp is fully backward compatible with SLPv2. It does not introduce any new protocol elements. mslp only defines several new attributes for the Advert message and a new SLP extension ( meshforwarding extension ). As we have described in Section 2, each periodically multicasts unsolicited Advert messages, which enable a to be discovered by s, s and other s. A can put new attributes in its Advert messages to signify the information for coordination. Thus, by properly setting the attributes in Advert messages and properly handling these attributes at the other party, peer s can interact with each other to provide the desired functionality. The coordination is added as an enhancement to a, its original functions are not affected. Moreover, the changes are almost transparent to s and s. s can be kept unchanged. s can be greatly simplified if they use the mesh-forwarding capability for their service registrations. To do this, a mesh-aware needs to explicitly specify its mesh-forwarding request by using the mesh-forwarding extension (see Section 3.3 for detail). Deployment: mslp supports incremental deployment of mesh-enhanced s. A mesh-enhanced can set up peer relationships with both mesh-enhanced s and non-mesh-enhanced s. In the latter case, the message forwarding only goes in uni-direction from the meshenhanced to a non-mesh-enhanced. When meshenhanced s coexist with non-mesh-enhanced s in a system, a mesh-aware should take care of newly found non-mesh-enhanced s and rebooted non-meshenhanced s since these non-mesh-enhanced s can not get existing data from other s. Therefore, uniformly mesh-enhanced s can provide a much easier job for mesh-aware s. 4

5 1 Advert (TCP) [ attr = peering connection indication ] 2 1 Advert (TCP) [ attr = keepalive ] 2 1 Figure 7: Peering Connection Indication Advert (TCP) [ attr = data copy request ] SrvReg (TCP) (data of shared scopes) Figure 8: Dumping Data 3.2 Peer Relationship Management 2 A peer relationship has three stages: setting up, keeping, and tearing down. In mslp, a mesh-enhanced maintains a peer list. It adds an entry to the list whenever it discovers a new peer, and removes an entry when it finds the corresponding peer is down. Each entry in this peer list should include peer URL, shared scopes, boot timestamp, and peering TCP connection ID. The boot timestamp is used to identify a rebooted peer. The peering TCP connection is used for message forwarding. When a mesh-enhanced learns about a new peer, it creates a peering TCP connection to the peer (at port 427) if such connection does not yet exist. Then it sends a Advert message with the peering-connection-indication attribute through this channel to notify the peer that this is a peering TCP connection (Figure 7). Thus, the peer can also use this channel to send messages in opposite direction. After the peering TCP connection is established or identified, peer s begin to forward new service registration information to each other via this channel. At the same time, a mesh-enhanced should decide whether it needs to download the data from its new peers. For example, when a newly booted joins a peering set of three s, it needs to get a copy of the existing registration data from any one of these three s (the choice can be made randomly), but not from all of them which incurs a lot of redundant transmissions. To do this, it sends a Advert message with the data-copy-request attribute to the chosen peer (Figure 8). On the other end, when a meshenhanced receives the data-copy-request in a Advert message, it dumps all the data of the shared scopes to the requesting. Each data record is sent as a SrvReg message, with a re-calculated new lifetime (= old lifetime elapsed time). After exchanging the data in both directions, peer s have the same consistent data for the shared scopes. According to SLPv2, a could close a TCP connection if it has been idle for too long. To keep a peering TCP connection alive, a mesh-enhanced sends a Advert message with the keepalive attribute (Figure 9) to the Figure 9: Keepalive peer if no other messages have been sent via the channel for a long period (predefined). A mesh-enhanced should tear down a peer relationship when it finds that the peer has closed the peering TCP connection; when it receives a multicast Advert message from the peer with a stateless boot timestamp set to 0 meaning the peer is going to shutdown; or when it has not received any message from the peer via the peering channel for a long period (predefined). In the last case, there may be a network partition and peer states get inconsistent. To tear down a peer relationship, a stops forwarding any service registration information to this peer, closes peering TCP connection with this peer, and removes this peer from its peer list. 3.3 Message Forwarding Control During the peering period, peer s forward new service registration information from s to each other. We define a new SLP extension - mesh-forwarding extension for the message forwarding purpose. This extension is always six bytes long: five-byte extension header and one-byte extension data denoted as Action field. The Action field is used to specify forwarding actions: TO BE FORWARDED marks the message needs to be forwarded; HAS BEEN FORWARDED means the message has already been forwarded, and there is no need to be forwarded again. The message forwarding rules are as follows: 1. Explicit Forwarding: A message is forwarded only when it explicitely requests to be forwarded. A meshaware needs to attach the mesh-forwarding extension to a SrvReg or SrvDeReg message and set the Action field to TO BE FORWARDED if it wants the message to be forwarded by a mesh-enhanced. This is for the compatibility with SLPv2, where s need to register with all existing s. To avoid unnecessary forwarding, the explicit forwarding rule is used. 2. One-hop Forwarding: A SrvReg or SrvDeReg message is forwarded only once by a mesh-enhanced to all its peers in the registration scope. Before forwarding a message, a mesh-enhanced sets the Action field to HAS BEEN FORWARDED. In this way, a forwarded message will never be forwarded again. Since the peering set is in a fully connected mesh, one-hop forwarding is enough to ensure that the service registration information from an can reach all peer s. Figure 10 shows how a service registration message is forwarded. 3. Handling SrvAck: A always replies with a ser- 5

6 (TO_BE_FORWARDED) SrvReg / SrvDeReg SrvAck 1 (HAS_BEEN_FORWARDED) SrvReg / SrvDeReg SrvAck 2 1 (Busi., Engi.) Figure 10: Forwarding Registration Peering Connection / (Busi., Engi., Law) Peering Connection vice acknowledgment (SrvAck) message when it receives a SrvReg or SrvDeReg message. So a mesh-enhanced should process SrvAck messages from other s. 4 Example Let s go through an example to see how mslp works. Considering that we want to deploy an mslp system in Columbia University main campus, and we would like to assign the services in Law School (L-School), Business School (B-School) and Engineering School (E-School) to three different scopes. Instead of using a separate for each school, mslp uses three s in a fully meshed peering architecture. Each serves two scopes and each school is served by two s (Figure 11). For example, 1 serves both B-School and E-School, and L-School is served by 2 and 3. We can run this example on four computers: one for the /, and three for the s. Each machine can host only one since a needs to bind to the SLP reserved port 427. An mslp system can be in one of the three stages: 1. Normal stage: This is a stable stage featuring automatic registration information distribution. Assume that the mesh-aware does service registrations with the mesh-forwarding extension, say it registers services in B- School with 1, services in E-School with 2, and services in L-School with 3, then this mslp system will distributethe service registration information automatically among peer s for the shared scopes. Now let the query service information in L-School with 2, it will get the same data as what the has registered with Under partial crash: This is an unstable stage needs to be taken care of. Assume one of the three s crashes, say 1 (we can simulate its crash by removing its network connection and then turning it off), this mslp system can still function well unless more s crash. Although the data of B-School and E-School are not available from 1, they can be retrieved from 3 and 2, respectively. 3. Recovery from crash: When a crashed comes up, say 1 (we reconnect 1 machine to the network and reboot it), it sets up peer relationship with other s again. Since now 1 carries a new boot timestamp, 2 and 3 knows that it is rebooted and coordinates with it. 1 retrieves B-School data from 3 and E-School data from 2, then this peering set is back to normal. Thanks to the fully meshed peering architecture, the recovery of 1 from crash is done automatically through 2 (Engi., Law) Peering Connection Figure 11: an mslp System Example coordination, no involvement is needed. 5 Implementation 3 (Law, Busi.) We have done a prototype implementation of mslp. It is available at zwb/project/slp. A little more effort is needed for an mslp implementation which requires a peer relationship management and service registration forwarding control. However, an mslp implementation is greatly simplified since it no longer needs to implement the complicated algorithm to register with all existing s and to re-register when new s are discovered, or old s are found to have rebooted. So the overall implementation cost of mslp is about the same as SLPv2 if it is not reduced. 6 Related Work Our early work on mslp was presented as an Internet Draft in Interaction of SLP Directory Agents for Reliability and Scalability [14]. The fully meshed peer relationship is used in IBGP [13]. Redundancy is a basic method to ensure reliability, the DNS [11, 12] primary and secondary server architecture is a good example of this. 7 Conclusion In this paper we presented mslp - Mesh-enhanced Service Location Protocol. It enhances SLP with a fully meshed peering architecture. mslp can provide a reliable directory service for an SLP system. It can also greatly simplify service registration which can lead to a thin-client implementation. mslp is fully compatible with SLPv2, and it supports incremental deployment. A further extension to the interaction of mslp s is to forward queries besides registrations. It works as follows: When a mesh-enhanced receives a query which is not in its scope, it forwards the query to another which supports the scope. This can simplify implementation since s do not need to keep track of 6

7 scopes. A can send its queries to any mesh-enhanced. However, this adds much complexity to the meshenhanced implementation. First, a mesh-enhanced needs to keep track of all s of all scopes, not only the s that share some scopes with it. Second, a meshenhanced needs to forward the query to another, and it also needs to forward the reply from another back to the. mslp does not include this extension mainly due to its complexity. However, for a thin-client implementation, it might deserve further considerations. [13] Y. Rekhter and T. Li. A border gateway protocol 4 (BGP-4). Request for Comments 1771, Internet Engineering Task Force, March [14] W. Zhao and H. Schulzrinne. Interaction of SLP directory agents for reliability and scalability. Internet Draft, Internet Engineering Task Force, April Work in progress. Acknowledgments: Erik Guttman provided valuable comments and suggestions for our work on mslp. References [1] T. Berners-Lee, R. Fielding, and L. Masinter. Uniform resource identifiers (URI): generic syntax. Request for Comments 2396, Internet Engineering Task Force, August [2] Y. Goland, T. Cai, P. Leach, Y. Gu, and S. Albright. Simple service discovery Protocol/1.0 operationg without an arbiter. Internet Draft, Internet Engineering Task Force, November Work in progress. [3] E. Guttman, C. Perkins, and J. Kempf. Service templates and service: Schemes. Request for Comments 2609, Internet Engineering Task Force, June [4] E. Guttman, C. Perkins, J. Veizades, and M. Day. Service location protocol, version 2. Request for Comments 2608, Internet Engineering Task Force, June [5] Bluetooth home page. [6] Ir home page. [7] Jini home page. [8] Salutation home page. [9] UPnP home page. [10] D. Meyer. Administratively scoped IP multicast. Request for Comments 2365, Internet Engineering Task Force, July [11] P. V. Mockapetris. Domain names - concepts and facilities. Request for Comments 1034, Internet Engineering Task Force, November [12] P. V. Mockapetris. Domain names - implementation and specification. Request for Comments 1035, Internet Engineering Task Force, November

mslp - Mesh-enhanced Service Location Protocol Λ

mslp - Mesh-enhanced Service Location Protocol Λ mslp - Mesh-enhanced Service Location Protocol Λ Weibin Zhao y, Henning Schulzrinne y and Erik Guttman z y Columbia University fzwb,hgsg@cs.columbia.edu z Sun Microsystems erik.guttman@germany.sun.com

More information

Network Working Group. E. Guttman Sun Microsystems April 2003

Network Working Group. E. Guttman Sun Microsystems April 2003 Network Working Group Request for Comments: 3528 Category: Experimental W. Zhao H. Schulzrinne Columbia University E. Guttman Sun Microsystems April 2003 Status of this Memo Mesh-enhanced Service Location

More information

Some Notes on Security in the Service Location Protocol Version 2 (SLPv2)

Some Notes on Security in the Service Location Protocol Version 2 (SLPv2) Some Notes on Security in the Service Location Protocol Version 2 (SLPv2) Marco Vettorello, Christian Bettstetter, and Christian Schwingenschlögl Technische Universität München (TUM), Institute of Communication

More information

A Service Browser for the Service Location Protocol Version 2 (SLPv2)

A Service Browser for the Service Location Protocol Version 2 (SLPv2) A Browser for the Location Protocol Version 2 (SLPv2) Eivind Jåsund, Christian Bettstetter, and Christian Schwingenschlögl Technische Universität München (TUM) Institute of Communication Networks D 80290

More information

JESA Service Discovery Protocol

JESA Service Discovery Protocol JESA Service Discovery Protocol Efficient Service Discovery in Ad-Hoc Networks Stephan Preuß University of Rostock; Dept. of Computer Science; Chair for Information and Communication Services mailto:spr@informatik.uni-rostock.de

More information

Service Recommendation using SLP

Service Recommendation using SLP Service Recommendation using SLP Evan Hughes, David McCormack, Michel Barbeau, and Francis Bordeleau Carleton University, School of Computer Science 1125 Colonel By Drive Ottawa, ON Canada K1S 5B6 Email:

More information

Service Location Protocol: A Java Prototype

Service Location Protocol: A Java Prototype Service Location Protocol: A Java Prototype Jack Caldwell Columbia University April 28, 1998 ABSTRACT The Internet continues to grow at exponential rates, offering a significant number of services to clients;

More information

Service Location Protocol for Mobile Users

Service Location Protocol for Mobile Users Location Protocol for Mobile Users Charles E. Perkins ABSTRACT Location Protocol has been designed within the Internet Engineering Task Force to simplify or eliminate the configuration needs for users

More information

Advanced Network Approaches for Wireless Environment

Advanced Network Approaches for Wireless Environment Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk

More information

Keywords: Service Discovery, SLP, Salutation, Bluetooth, UPnP, Jini, SLP-Jini, Salutation- Bluetooth, SLP-Salutation.

Keywords: Service Discovery, SLP, Salutation, Bluetooth, UPnP, Jini, SLP-Jini, Salutation- Bluetooth, SLP-Salutation. SERVICE DISCOVERY IN MOBILE ENVIRONMENTS Ritesh Mehta Department of Computer Science and Engineering The University of Texas at Arlington mehta@cse.uta.edu Abstract Advent of mobile and wireless computing

More information

SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT

SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT Arto Hämäläinen Lappeenranta University of Technology P.O. Box 20, 53851 Lappeenranta, Finland arto.hamalainen@lut.fi Jari Porras Lappeenranta University

More information

Category: Standards Track C. Perkins Sun Microsystems S. Kaplan June 1997

Category: Standards Track C. Perkins Sun Microsystems S. Kaplan June 1997 Network Working Group Request for Comments: 2165 Category: Standards Track J. Veizades @Home Network E. Guttman C. Perkins Sun Microsystems S. Kaplan June 1997 Service Location Protocol Status of This

More information

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo

Charles Perkins Nokia Research Center 2 July Mobility Support in IPv6 <draft-ietf-mobileip-ipv6-14.txt> Status of This Memo IETF Mobile IP Working Group INTERNET-DRAFT David B. Johnson Rice University Charles Perkins Nokia Research Center 2 July 2000 Mobility Support in IPv6 Status of This

More information

Distributed Systems 26. Mobile Ad Hoc Mesh Networks

Distributed Systems 26. Mobile Ad Hoc Mesh Networks Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers

More information

Network Working Group. Sun Microsystems October 2001

Network Working Group. Sun Microsystems October 2001 Network Working Group Request for Comments: 3105 Category: Experimental J. Kempf NTT DoCoMo USA Labs G. Montenegro Sun Microsystems October 2001 Finding an RSIP Server with SLP Status of this Memo This

More information

CSE 123A Computer Netwrking

CSE 123A Computer Netwrking CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003

Quick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003 CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last

More information

Service Discovery and Invocation for Mobile Ad Hoc Networked Appliances

Service Discovery and Invocation for Mobile Ad Hoc Networked Appliances Service Discovery and Invocation for Ad Hoc Networked Appliances Liang Cheng and Ivan Marsic Department of Electrical and Computer Engineering Rutgers The State University of New Jersey 94 Brett Rd., Piscataway,

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to

More information

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004 CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the

More information

Comparative Study of Service Discovery Protocols for ad-hoc Networks

Comparative Study of Service Discovery Protocols for ad-hoc Networks Proceedings of the 6th WSEAS Int. Conf. on Electronics, Hardware, Wireless and Optical Communications, Corfu Island, Greece, February 16-19, 2007 156 Comparative Study of Service Discovery Protocols for

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

Comparison of Bandwidth Usage: Service Location Protocol and Jini

Comparison of Bandwidth Usage: Service Location Protocol and Jini Comparison of Bandwidth Usage: Service Location Protocol and Jini Javier Govea and Michel Barbeau School of Computer Science Carleton University 1125 Colonel By Drive Ottawa, ON K1S 5B6 Canada fjgovea,barbeaug@scs.carleton.ca

More information

DHCP for IPv6. Palo Alto, CA Digital Equipment Company. Nashua, NH mentions a few directions about the future of DHCPv6.

DHCP for IPv6. Palo Alto, CA Digital Equipment Company. Nashua, NH mentions a few directions about the future of DHCPv6. DHCP for IPv6 Charles E. Perkins and Jim Bound Sun Microsystems, Inc. Palo Alto, CA 94303 Digital Equipment Company Nashua, NH 03062 Abstract The Dynamic Host Conguration Protocol (DHCPv6) provides a framework

More information

Service Provision in Ad Hoc Networks

Service Provision in Ad Hoc Networks Service Provision in Ad Hoc Networks Radu Handorean and Gruia-Catalin Roman Department of Computer Science Washington University Saint Louis, MO, 63130 {raduh, roman}@cs.wustl.edu Abstract. The client-server

More information

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract

More information

UPnP Services and Jini Clients

UPnP Services and Jini Clients UPnP Services and Jini Clients Jan Newmarch School of Network Computing Monash University jan.newmarch@infotech.monash.edu.au Abstract UPnP is middleware designed for network plug and play. It is designed

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

SERVICE DISCOVERY IN MOBILE ENVIRONMENTS

SERVICE DISCOVERY IN MOBILE ENVIRONMENTS SERVICE DISCOVERY IN MOBILE ENVIRONMENTS Nandini Ravi Department of Computer Science and Engineering University of Texas, Arlington nravi@cse.uta.edu Abstract Mobile computing and mobile devices such as

More information

Chapter 3: Naming Page 38. Clients in most cases find the Jini lookup services in their scope by IP

Chapter 3: Naming Page 38. Clients in most cases find the Jini lookup services in their scope by IP Discovery Services - Jini Discovery services require more than search facilities: Discovery Clients in most cases find the Jini lookup services in their scope by IP multicast/broadcast Multicast UDP for

More information

Design and Implementation of a Service Discovery Architecture in Pervasive Systems

Design and Implementation of a Service Discovery Architecture in Pervasive Systems Design and Implementation of a Service Discovery Architecture in Pervasive Systems Vincenzo Suraci 1, Tiziano Inzerilli 2, Silvano Mignanti 3, University of Rome La Sapienza, D.I.S. 1 vincenzo.suraci@dis.uniroma1.it

More information

A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET

A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET 2008 IEEE Asia-Pacific Services Computing Conference A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET Shubhranshu Singh Advanced Technology Division Samsung India Software Operations

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

DHCP Technology White Paper

DHCP Technology White Paper DHCP Technology White Paper Keywords: DHCP, DHCP server, DHCP relay agent, DHCP client, BOOTP client. Abstract: This document describes DHCP basic concepts and applications, as well as the main functions

More information

LECTURE 8. Mobile IP

LECTURE 8. Mobile IP 1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

A Service Discovery Model for Wireless and Mobile Terminals in IPv6

A Service Discovery Model for Wireless and Mobile Terminals in IPv6 A Service Discovery Model for Wireless and Mobile Terminals in IPv6 Bilhanan Silverajan, Jaakko Kalliosalo, Jarmo Harju Dept. of Information Technology, Tampere University of Technology, P.O. Box 553,

More information

Jini Technology Overview

Jini Technology Overview Jini Technology Overview Bob Scheifler Senior Staff Engineer Sun Microsystems, Inc Talk outline very brief Jini overview Jini lookup service in some depth service types and type matching attributes and

More information

Finding Support Information for Platforms and Cisco IOS Software Images

Finding Support Information for Platforms and Cisco IOS Software Images First Published: June 19, 2006 Last Updated: June 19, 2006 The Cisco Networking Services () feature is a collection of services that can provide remote event-driven configuring of Cisco IOS networking

More information

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 1 March 2001

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 1 March 2001 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-16.txt J. Bound Nokia M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center R. Droms(ed.) Cisco

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

CptS 464/564 Lecture 18

CptS 464/564 Lecture 18 CptS 464/564 Lecture 18 2nd November 2004 Checkpoint What have we covered so far? Paradigms and Models: frameworks for the discussion of DS What is the plan ahead? Next: examples of distributed systems

More information

Chapter 13 Configuring BGP4

Chapter 13 Configuring BGP4 Chapter 13 Configuring BGP4 This chapter provides details on how to configure Border Gateway Protocol version 4 (BGP4) on HP products using the CLI and the Web management interface. BGP4 is supported on

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

Enhanced Topolgoy Formation Protocol for IEEE WLAN based Mesh Networks*

Enhanced Topolgoy Formation Protocol for IEEE WLAN based Mesh Networks* Enhanced Topolgoy Formation Protocol for IEEE 802.11 WLAN based Mesh Networks* Deepesh Man Shrestha Graduate School of Information and Communication Ajou University, Suwon, Republic of Korea deepesh@ajou.ac.kr

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

CALIFORNIA SOFTWARE LABS

CALIFORNIA SOFTWARE LABS UPnP,Jini and Salutation - A look at some popular coordination frameworks for future networked CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway,

More information

Common Service Discovery Scheme in IoT Environments

Common Service Discovery Scheme in IoT Environments , pp.28-32 http://dx.doi.org/10.14257/astl.2018.149.07 Common Service Discovery Scheme in IoT Environments Joosang Youn 1 * and TaeJin Lee 2 1 Dept. of Industrial ICT Engineering, Dong-Eui University 176,

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

A SCALABLE SERVICE DISCOVERY FRAMEWORK WITH LOAD SHARING CAPABILITIES

A SCALABLE SERVICE DISCOVERY FRAMEWORK WITH LOAD SHARING CAPABILITIES A SCALABLE SERVICE DISCOVERY FRAMEWORK WITH LOAD SHARING CAPABILITIES Manuel Urueña, David Larrabeiti and Pablo Serrano Universidad Carlos III de Madrid Av. Universidad 30, Leganés. Spain {muruenya,dlarra,pablo}@it.uc3m.es

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Service Discovery in the Future Electronic Market

Service Discovery in the Future Electronic Market From: AAAI Technical Report WS-00-04. Compilation copyright 2000, AAAI (www.aaai.org). All rights reserved. Service Discovery in the Future Electronic Market Harry Chen, Dipanjan Chakraborty, Liang Xu,

More information

Using MSDP to Interconnect Multiple PIM-SM Domains

Using MSDP to Interconnect Multiple PIM-SM Domains Using MSDP to Interconnect Multiple PIM-SM Domains This module describes the tasks associated with using Multicast Source Discovery Protocol (MSDP) to interconnect multiple Protocol Independent Multicast

More information

Request for Comments: 3764 Category: Standards Track April enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record

Request for Comments: 3764 Category: Standards Track April enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record Network Working Group J. Peterson Request for Comments: 3764 NeuStar Category: Standards Track April 2004 enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record Status of this

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

[MS-SSDP-Diff]: SSDP: Networked Home Entertainment Devices (NHED) Extensions

[MS-SSDP-Diff]: SSDP: Networked Home Entertainment Devices (NHED) Extensions [MS-SSDP-Diff]: SSDP: Networked Home Entertainment Devices (NHED) Extensions Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open

More information

Rendezvous Point Engineering

Rendezvous Point Engineering Rendezvous Point Engineering Last updated: November 2008 Introduction A Rendezvous Point (RP) is a router in a multicast network domain that acts as a shared root for a multicast shared tree. Any number

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

Handover Management for Mobile Nodes in IPv6 Networks

Handover Management for Mobile Nodes in IPv6 Networks TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we

More information

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP Introduction: Mobile IP Overview An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet

More information

Dynamic Device Access for Mobile Users

Dynamic Device Access for Mobile Users Dynamic Device Access for Mobile Users Dirk Kutscher and Jörg Ott Technologiezentrum Informatik (TZI), Universität Bremen, Postfach 330440, 28334 Bremen, Germany, {dku jo}@tzi.uni-bremen.de Abstract. The

More information

Context-Aware Service Selection Based on Dynamic and Static Service Attributes

Context-Aware Service Selection Based on Dynamic and Static Service Attributes Context-Aware Service Selection Based on Dynamic and Static Service Attributes Steve Cuddy, Michael Katchabaw, and Hanan Lutfiyya Abstract -- Context-aware applications are able to use context, which refers

More information

Obsoletes: 2002 January 2002 Category: Standards Track

Obsoletes: 2002 January 2002 Category: Standards Track Network Working Group C. Perkins, Ed. Request for Comments: 3220 Nokia Research Center Obsoletes: 2002 January 2002 Category: Standards Track Status of this Memo IP Mobility Support for IPv4 This document

More information

A Framework for Optimizing IP over Ethernet Naming System

A Framework for Optimizing IP over Ethernet Naming System www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul

More information

Mobile, Distributed, and Pervasive Computing

Mobile, Distributed, and Pervasive Computing Handbook of Wireless Networks and Mobile Computing, Edited by Ivan Stojmenović Copyright 2002 John Wiley & Sons, Inc. ISBNs: 0-471-41902-8 (Paper); 0-471-22456-1 (Electronic) CHAPTER 27 Mobile, Distributed,

More information

Internet Engineering Task Force (IETF) Request for Comments: 7213 Category: Standards Track. M. Bocci Alcatel-Lucent June 2014

Internet Engineering Task Force (IETF) Request for Comments: 7213 Category: Standards Track. M. Bocci Alcatel-Lucent June 2014 Internet Engineering Task Force (IETF) Request for Comments: 7213 Category: Standards Track ISSN: 2070-1721 D. Frost Blue Sun S. Bryant Cisco Systems M. Bocci Alcatel-Lucent June 2014 Abstract MPLS Transport

More information

Naming and Service Discovery in Peer-to-Peer Networks

Naming and Service Discovery in Peer-to-Peer Networks Naming and Service Discovery in Peer-to-Peer Networks ECE1770 Expert Topic Eli Fidler Vinod Muthusamy February 13, 2003 Outline Traditional Distributed Naming Systems Distributed Naming Paradigms P2P Naming

More information

Voice over IP Consortium

Voice over IP Consortium Voice over IP Consortium Version 1.6 Last Updated: August 20, 2010 121 Technology Drive, Suite 2 University of New Hampshire Durham, NH 03824 Research Computing Center Phone: +1-603-862-0186 Fax: +1-603-862-4181

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8] 192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer

More information

Yet another redirection mechanism for the World-Wide Web?

Yet another redirection mechanism for the World-Wide Web? Yet another redirection mechanism for the World-Wide Web? Aline Baggio Vrije Universiteit Department of Computer Science De Boelelaan 1081a 1081HV Amsterdam The Netherlands http://www.cs.vu.nl/ baggio/

More information

Internet Engineering Task Force. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 22 November 2000

Internet Engineering Task Force. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 22 November 2000 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-15.txt J. Bound Compaq Computer Corp. M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center

More information

End-to-End Architectures for the Internet Host Mobility: An Overview

End-to-End Architectures for the Internet Host Mobility: An Overview Page 1 of 7 End-to-End Architectures for the Internet Host Mobility: An Overview Bilal Farooq Lahore University of Management Sciences Department of Computer Science bilalf@lums.edu.pk April 7 th, 2003

More information

ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX

ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX M. L. Jiang and Y. C. Tay ABSTRACT The base Mobile Internet Protocol (Mobile IP)[1] provides a means for portable computers to roam

More information

Service Discovery and Name Resolution Architectures for On-Demand MANETs

Service Discovery and Name Resolution Architectures for On-Demand MANETs Service Discovery and Name Resolution Architectures for On-Demand MANETs Paal Engelstad, Yan Zheng, Tore Jønvik, Do Van Thanh University of Oslo (UniK) / Telenor R&D, 1331 Fornebu, Norway {Paal.Engelstad,

More information

Internet of Things 2018/2019

Internet of Things 2018/2019 Internet of Things 2018/2019 Discovering the Things Johan Lukkien with slides by Milosh Stolikj John Carpenter, 1982 1 Guiding questions What does service discovery entail, and what are relevant criteria

More information

Service Discovery in Pervasive Computing Environments

Service Discovery in Pervasive Computing Environments Service Discovery in Pervasive Computing Environments Presented by Jamal Lewis and Shruti Pathak CS 570 Computer Networks Instructor Dr. Feng Zhu Introduction What is it? Pervasive Computing Environments

More information

Redundancy for Routers using Enhanced VRRP

Redundancy for Routers using Enhanced VRRP Redundancy for Routers using Enhanced VRRP 1 G.K.Venkatesh, 2 P.V. Rao 1 Asst. Prof, Electronics Engg, Jain University Banglaore, India 2 Prof., Department of Electronics Engg., Rajarajeshwari College

More information

Staged Refresh Timers for RSVP

Staged Refresh Timers for RSVP Staged Refresh Timers for RSVP Ping Pan and Henning Schulzrinne Abstract The current resource Reservation Protocol (RSVP) design has no reliability mechanism for the delivery of control messages. Instead,

More information

RFC 003 Event Service October Computer Science Department October 2001 Request for Comments: 0003 Obsoletes: none.

RFC 003 Event Service October Computer Science Department October 2001 Request for Comments: 0003 Obsoletes: none. Ubiquitous Computing Bhaskar Borthakur University of Illinois at Urbana-Champaign Software Research Group Computer Science Department October 2001 Request for Comments: 0003 Obsoletes: none The Event Service

More information

SERVICE DISCOVERY A SURVEY AND COMPARISON

SERVICE DISCOVERY A SURVEY AND COMPARISON SERVICE DISCOVERY A SURVEY AND COMPARISON Bendaoud Karim Talal 1 and Merzougui Rachid 2 1 STIC Laboratory, Department of Telecommunication, University of Tlemcen, Algeria bendaoud.talal@gmail.com 2 STIC

More information

A DHT-based Distributed Location Service for Internet Applications

A DHT-based Distributed Location Service for Internet Applications A DHT-based Distributed Location Service for Internet Applications Simone Cirani and Luca Veltri Department of Information Engineering University of Parma Viale G. P. Usberti 181/A, 43100 Parma - Italy

More information

Internet Engineering Task Force (IETF) Request for Comments: ISSN: November 2013

Internet Engineering Task Force (IETF) Request for Comments: ISSN: November 2013 Internet Engineering Task Force (IETF) N. Borenstein Request for Comments: 7072 Mimecast Category: Standards Track M. Kucherawy ISSN: 2070-1721 November 2013 Abstract A Reputation Query Protocol This document

More information

Utilizing Multiple Home Links in Mobile IPv6

Utilizing Multiple Home Links in Mobile IPv6 Utilizing Multiple Home Links in Mobile IPv6 Hongbo Shi and Shigeki Goto Department of Computer Science, Waseda University 3-4-1 Ohkubo Shijuku-ku, Tokyo, 169-8555 JAPAN Email: {shi, goto}@goto.info.waseda.ac.jp

More information

[MS-WINSRA]: Windows Internet Naming Service (WINS) Replication and Autodiscovery Protocol

[MS-WINSRA]: Windows Internet Naming Service (WINS) Replication and Autodiscovery Protocol [MS-WINSRA]: Windows Internet Naming Service (WINS) Replication and Autodiscovery Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes

More information

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering

Fixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Name Resolution and Service Discovery on the Internet and in Ad Hoc Networks

Name Resolution and Service Discovery on the Internet and in Ad Hoc Networks Chapter 8 Name Resolution and Service Discovery on the Internet and in Ad Hoc Networks Paal E. Engelstad and Geir Egeland CONTENTS Name Resolution... 172 An Architecture for Naming Services... 173 A Generic

More information

A Tutorial on The Jini Technology

A Tutorial on The Jini Technology A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far A Tutorial on The Jini Technology Lian Chen Introduction Jini network technology provides a simple

More information

IPV6 SIMPLE SECURITY CAPABILITIES.

IPV6 SIMPLE SECURITY CAPABILITIES. IPV6 SIMPLE SECURITY CAPABILITIES. 50 issues from RFC 6092 edited by J. Woodyatt, Apple Presentation by Olle E. Johansson, Edvina AB. ABSTRACT The RFC which this presentation is based upon is focused on

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Agent-Enabling Transformation of E-Commerce Portals with Web Services

Agent-Enabling Transformation of E-Commerce Portals with Web Services Agent-Enabling Transformation of E-Commerce Portals with Web Services Dr. David B. Ulmer CTO Sotheby s New York, NY 10021, USA Dr. Lixin Tao Professor Pace University Pleasantville, NY 10570, USA Abstract:

More information

DNS-based service discovery in ad hoc networks: evaluation and improvements

DNS-based service discovery in ad hoc networks: evaluation and improvements DNS-based service discovery in ad hoc networks: evaluation and improvements Celeste Campo and Carlos García-Rubio Dept. de Ingeniería Telemática - Universidad Carlos III de Madrid Escuela Politécnica Superior

More information

Request for Comments: 5437 Category: Standards Track Isode Limited January 2009

Request for Comments: 5437 Category: Standards Track Isode Limited January 2009 Network Working Group Request for Comments: 5437 Category: Standards Track P. Saint-Andre Cisco A. Melnikov Isode Limited January 2009 Status of This Memo Sieve Notification Mechanism: Extensible Messaging

More information

An agent-based peer-to-peer grid computing architecture

An agent-based peer-to-peer grid computing architecture University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2005 An agent-based peer-to-peer grid computing architecture J. Tang University

More information

A Location Service for Worldwide Distributed Objects

A Location Service for Worldwide Distributed Objects A Location Service for Worldwide Distributed Objects 1 A Location Service for Worldwide Distributed Objects Franz J. Hauck 1, Maarten van Steen, Andrew S. Tanenbaum Dept. of Math. and Computer Science,

More information

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol)

Transport Layer. -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) Transport Layer -UDP (User Datagram Protocol) -TCP (Transport Control Protocol) 1 Transport Services The transport layer has the duty to set up logical connections between two applications running on remote

More information

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 15 April 2001

Internet Engineering Task Force INTERNET DRAFT. C. Perkins Nokia Research Center R. Droms(ed.) Cisco Systems 15 April 2001 Internet Engineering Task Force INTERNET DRAFT DHC Working Group Obsoletes: draft-ietf-dhc-dhcpv6-18.txt J. Bound Nokia M. Carney Sun Microsystems, Inc C. Perkins Nokia Research Center R. Droms(ed.) Cisco

More information